Forbes CommunityVoice™ allows professional fee-based membership groups ("communities") to connect directly with the Forbes audience by enabling them to create content – and participate in the conversation – on the Forbes digital publishing platform. Each topic-based CommunityVoice™ is produced and managed by the group.

Opinions expressed within Forbes CommunityVoice™ are those of the participating individuals.

The onset of smart security devices is here and more, and more homeowners are looking to integrate them into their homes to take advantage of delivery services offered by online companies. Online giant Amazon is one such company that offers a smart technology system that allows consumers to have their goods delivered right inside their home, according to a BBC News report.

Shutterstock

Some say this can thwart thieves from stealing packages, which has become an increasing problem. Others say the technology invades people's privacy and may not be fail-safe. In order for companies to ensure these smart security technologies are safe, they need to take these fears into consideration.

Thirteen members of Forbes Technology Council share what tech companies need to keep in mind regarding home products like smart keys, video doorbells and security devices. Here is what they recommend:

1. The Value Of Privacy

Amazon put microphones in your home. Then it put cameras and it now wants the keys. That's a lot of trust placed in a single corporation. The legal system is unable to catch up with the evolution of the technology. Will the Fourth Amendment hold if a tech company is subpoenaed for your keys or the video from your house? What is the responsibility of Amazon if a crime is committed? - Dimitri Stiliadis, Aporeto

2. Authorization Mechanisms

When there's a new convenient way of doing something, we need to consider security. Whether it be access to a system or a physical site or location, the authorization mechanisms have to be robust and well tested for vulnerabilities. For example, consider the issues with eavesdropping on baby monitors. All aspects of the design of these systems need to be considered. - Chris Kirby,Voices.com

3. Wi-Fi Access Makes The Service Hackable

There is reason for skepticism in this new concept of allowing couriers into a locked home to deliver goods. Most of these devices rely heavily on Wi-Fi, which remains readily hackable by a person with average hacking skills. Not only is this a liability issue for theft and crime, but it is also reasonable that it could be easily hacked to gain entry into a home. - Maria Clemens, Management and Network Services

4. People May Still Not Want To Do It

One thing Amazon should keep in mind is that even with all the technology available, people are still going to worry about crime and the temptation to steal or even just go through their stuff while delivering goods. - Chalmers Brown, Due

5. Boundaries Need To Be Maintained

Tech companies need to maintain customer privacy and security while thoroughly preparing for the multiple problems that can arise. Consistent vetting of operations and technology needs to be the norm because one incident can lead to the downfall of the entire endeavor. - Alexandro Pando, Xyrupt

6. Proper Hardware Installation Is Key

It’s important for tech companies to emphasize proper training so that hardware is installed properly each time. That way, a homeowner’s smart home technology works properly in a case where a courier does not behave ethically. To go big and succeed, they’ll need to provide a turnkey, magical experience. - Neha Sampat, Built.io

7. People Will Prefer Convenience Over Privacy

In today's digital lifestyle, most people will prefer convenience over traditional security or rigid privacy. Trusted brands like Amazon will immensely benefit from this, as will security monitoring and insurance/ID theft companies. It will lead to greater uptake of security monitoring services with video-based acknowledgment of entry/exits. Drone postmen and automated delivery will be the norm. - Shashi Kiran, Quali

8. Trust Is Earned

As companies launch services that are increasingly integrated into our homes, they should keep in mind that trust is slowly earned over time but can entirely be destroyed by one mistake. It might be a bug, vulnerability, rogue employee or how you handle a problem. But you should be prepared to be open and honest when it happens. - Jeff Williams, Contrast Security

9. The Need For IoT Smart Authorization

Companies will have to rely more on machine learning (ML) for facial recognition and threat detection in real time. The facial recognition software in the doorbell can utilize ML to enhance relevant details for authorization while blurring the rest. In the end, Amazon must still be liable for any crime. - Venkat Venkataraman, Tokbox.com

As smart technology becomes more present in the home, companies and consumers need to recognize that technology cannot prevent theft. Tech can be developed to respond to real-life scenarios, but theft is ultimately dependent on the character of the delivery person. Amazon needs to secure an experienced, comprehensive screening provider to vet its delivery personnel before launching this service. - Tammy Cohen, InfoMart

11. The Choice Is With The Customer

When it comes to the privacy and safety of a customer, it should always be as simple as possible to deactivate any service like this that gives another person access to their house. Any personal data of any kind (from their age to their home address) should be kept only as long as necessary and never sold or distributed without their permission. - Diego Fischer, Instacarro.com

12. Adoption Should Happen In Stages

Many of these services will sound as crazy and stupid as letting a stranger sleep on your couch (how the majority used to feel about Airbnb). You don't need to cater to the masses when your first products will be used by early adopters. Take comfort in building something for this small but rabid audience who will get you to the next phase of customer adoption. - Jon Hegranes,Kittyhawk.io

13. Ethical Hackers Can Expose Vulnerabilities

Connected devices are becoming more prominent in our lives, so it's of critical importance to engage with the white-hat hackers on keeping these devices secure. A simple way of doing so is to set up a clearly defined vulnerability disclosure process to allow a safe way for these hackers to submit security vulnerabilities they come across. - Alex Bekker, HackerOne

Forbes Technology Council is an invitation-only, fee-based organization comprised of leading CIOs, CTOs and technology executives. Find out if you qualify at forbestechcouncil.com. Questions about an article? Email feedback@forbescouncils.com....